19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

94<br />

Part II: Putting Ethical Hacking in Motion<br />

Understanding Password Vulnerabilities<br />

When you balance the cost of security and the value of the protected<br />

information, the combination of a user ID and a secret password is usually<br />

adequate. However, passwords give a false sense of security. The bad guys<br />

know this and attempt to crack passwords as a step toward breaking into<br />

computer systems.<br />

One big problem with relying solely on passwords for information security<br />

is that more than one person can know them. Sometimes, this is intentional;<br />

often, it’s not. The tough part is that there’s no way of knowing who, besides<br />

the password’s owner, knows a password.<br />

Remember that knowing a password doesn’t make someone an authorized user.<br />

Here are the two general classifications of password vulnerabilities:<br />

✓ Organizational or user vulnerabilities: This includes lack of password<br />

policies that are enforced within the organization and lack of security<br />

awareness on the part of users.<br />

✓ Technical vulnerabilities: This includes weak encryption methods and<br />

unsecure storage of passwords on computer systems.<br />

I explore each of these classifications in more detail in the following sections.<br />

Before computer networks and the Internet, the user’s physical environment<br />

was an additional layer of password security that actually worked pretty well.<br />

Now that most computers have network connectivity, that protection is gone.<br />

Refer to Chapter 6 for details on managing physical security in this age of networked<br />

computers and mobile devices.<br />

Organizational password vulnerabilities<br />

It’s human nature to want convenience, especially when it comes to remembering<br />

five, ten, and often dozens of passwords for work and daily life. This<br />

desire for convenience makes passwords one of the easiest barriers for an<br />

attacker to overcome. Almost 3 trillion (yes, trillion with a t and 12 zeros)<br />

eight-character password combinations are possible by using the 26 letters<br />

of the alphabet and the numerals 0 through 9. The keys to strong passwords<br />

are: 1) easy to remember and 2) difficult to crack. However, most people just<br />

focus on the easy-to-remember part. Users like to use such passwords as<br />

password, their login name, abc123, or no password at all! Don’t laugh; I’ve<br />

seen these blatant weaknesses and guarantee they’re on any given network<br />

this very moment.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!